Sciweavers

180 search results - page 11 / 36
» How Thorough Is Thorough Enough
Sort
View
TAMODIA
2008
13 years 8 months ago
Information Supply Mechanisms in Ubiquitous Computing, Crisis Management and Workflow Modelling
Abstract. The successful application of ubiquitous computing in crisis management requires a thorough understanding of the mechanisms that extract information from sensors and comm...
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M....
APCCM
2006
13 years 8 months ago
Component-driven engineering of database applications
Though it is commonly agreed that the design of large database schemata requires group effort, database design from component subschemata has not been investigated thoroughly. In ...
Klaus-Dieter Schewe, Bernhard Thalheim
CSREAEEE
2006
99views Business» more  CSREAEEE 2006»
13 years 8 months ago
Identification of a Two-Way Reflexivity Model in an Integrated Investment Decision-Support Framework
In stock markets, the performance of traditional technology-based investment methods is limited because they only take into account singledimensional event factors. The paper shows...
Wanli Chen
PTS
2000
108views Hardware» more  PTS 2000»
13 years 8 months ago
Determination of Test Configurations for Pair-Wise Interaction Coverage
Systems constructed from components, including distributed systems, consist of a number of elements that interact with each other. As the number of network elements or interchangea...
Alan W. Williams
AO
2007
77views more  AO 2007»
13 years 7 months ago
A precise model for contextual roles: The programming language ObjectTeams/Java
A number of proposals exist how to support the concept of roles at the level of programming languages. While some of these proposals indeed exhibit very promising properties, the c...
Stephan Herrmann